PT-2025-4145 · Cisco · Cisco Meeting Management
Ben Leonard-Lagarde
·
Published
2025-01-22
·
Updated
2025-08-01
·
CVE-2025-20156
9.9
Critical
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
The vulnerable software is Cisco Meeting Management, which has a flaw in its REST API that allows a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device. This is possible due to improper authorization enforcement, which can be exploited by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes managed by Cisco Meeting Management.
The vulnerable versions are 3.9 or earlier, and users should upgrade to a fixed release to prevent attacks. Over 100 devices are potentially affected, according to ZoomEye search results. An exploit for this flaw is available, and users are urged to update immediately to prevent attacks.
https://t.co/N8IJM5YWq7 and https://t.co/5RDw3PoTe9 provide more information about the exploit.
#Cisco #CiscoMeetingManagement #RESTAPI #PrivilegeEscalation #Cybersecurity #InfoSec #CyberThreats #MeetingManagement
Fix
LPE
DoS
Incorrect Default Permissions
Related Identifiers
Affected Products
References · 43
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc · Vendor Advisory
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-20156 · Security Note
- https://bdu.fstec.ru/vul/2025-04031 · Security Note
- https://twitter.com/TweetThreatNews/status/1882401005884604896 · Twitter Post
- https://twitter.com/securityRSS/status/1882881921337700721 · Twitter Post
- https://twitter.com/MalwarePatrol/status/1882491239066403223 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1882891736873136327 · Twitter Post
- https://twitter.com/EncryptSentinel/status/1882468508157825164 · Twitter Post
- https://twitter.com/TheHackersNews/status/1882321317875396959 · Twitter Post
- https://twitter.com/pravin_karthik/status/1882420990350966875 · Twitter Post
- https://twitter.com/vFeed_IO/status/1884800308309897497 · Twitter Post
- https://t.me/thehackernews/6213 · Telegram Post
- https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html · Note
- https://twitter.com/Brandefense/status/1883862112792875397 · Twitter Post